Filters








163 Hits in 10.9 sec

Automatically Lock Your Neural Networks When You're Away [article]

Ge Ren, Jun Wu, Gaolei Li, Shenghong Li
<span title="2021-03-15">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Three kinds of model training strategy are essential to achieve the tremendous performance divergence between certified and suspect input in one neural network.  ...  In this paper, we propose Model-Lock (M-LOCK) to realize an end-to-end neural network with local dynamic access control, which is similar to the automatic locking function of the smartphone to prevent  ...  Meanwhile, some researchers have studied the algorithm of removing the Black-Box Backdoor Watermarks from the deep neural network without prior knowledge of the structure of the watermark.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2103.08472v1">arXiv:2103.08472v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5yycqweuwfcdhluufnx2s5i2mm">fatcat:5yycqweuwfcdhluufnx2s5i2mm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210319094641/https://arxiv.org/pdf/2103.08472v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/f9/10f90b304360551ffeabdbdf642f839eb5ee3d00.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2103.08472v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Machine Learning-Based Malicious X.509 Certificates' Detection

Jiaxin Li, Zhaoxin Zhang, Changyong Guo
<span title="">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
With the popularization of X.509 certificates, more and more criminals leverage certificates to prevent their communications from being exposed by malicious traffic analysis tools.  ...  In addition, we obtain an SVM-based detection model with an accuracy of 98.2%, which is the highest accuracy.  ...  [4] , they applied deep neural networks to train detection models for rogue certificates.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11052164">doi:10.3390/app11052164</a> <a target="_blank" rel="external noopener" href="https://doaj.org/article/f43ef6bd2ac042a593d470b6f7c9e183">doaj:f43ef6bd2ac042a593d470b6f7c9e183</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kx6aaqvorrdepndixzp34t7dne">fatcat:kx6aaqvorrdepndixzp34t7dne</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210605011009/https://res.mdpi.com/d_attachment/applsci/applsci-11-02164/article_deploy/applsci-11-02164-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a1/ed/a1edbe2fd8839fd001ffd2bc7fda7237aff1c2c1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11052164"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations [article]

Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu
<span title="2018-08-16">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
To fill this gap, in this paper, we propose DRLGENCERT, the first framework of applying deep reinforcement learning to the automated testing of certificate verification in SSL/TLS implementations.  ...  Benefited by the deep reinforcement learning, when generating certificates, our framework could choose the best next action according to the result of a previous modification, instead of simple random  ...  In contrast, we are using new ways to get a large number of certificates with the information learned in a neural network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1808.05444v1">arXiv:1808.05444v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rlwpsn3eofejjgqhgigf7f2asy">fatcat:rlwpsn3eofejjgqhgigf7f2asy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200923162717/https://arxiv.org/pdf/1808.05444v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c8/3f/c83f0422acbcf7d068cccb8d44b17f73788e2e68.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1808.05444v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing

Basmah Al-Otaibi, Najla Al-Nabhan, Yuan Tian
<span title="2019-02-25">2019</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
This paper proposes a novel privacy-preserving vehicular rogue node detection scheme using fog computing.  ...  The proposed scheme is analyzed and evaluated using simulation, which presents significant improvements for data processing, accurately detecting rogue vehicles, minimizing overhead, and immunizing the  ...  In [17] , the authors detect a malicious packet injected into an in-vehicle controller area network (CAN) using a deep neural network structure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s19040965">doi:10.3390/s19040965</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e6s655q36rgrjmxtrwg56boxn4">fatcat:e6s655q36rgrjmxtrwg56boxn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191207140345/http://europepmc.org/backend/ptpmcrender.fcgi?accid=PMC6413014&amp;blobtype=pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/17/36/173682f0372d674dd99cb9d19b061406beec56c5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s19040965"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Blockchain-enabled wireless communications: a new paradigm towards 6G

Jiaheng Wang, Xintong Ling, Yuwei Le, Yongming Huang, Xiaohu You
<span title="2021-04-26">2021</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u4bdhpukkbe3ncikyibr6q4x7e" style="color: black;">National Science Review</a> </i> &nbsp;
However, this goal is impeded by a number of trust-related issues that are often neglected in network designs.  ...  from several aspects.  ...  , such as the learn vector quantization neural network [150] and the deep neural evolution network [151] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/nsr/nwab069">doi:10.1093/nsr/nwab069</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/34691739">pmid:34691739</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC8433085/">pmcid:PMC8433085</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pz44xzyetnee7beegpy3vkkcua">fatcat:pz44xzyetnee7beegpy3vkkcua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210629083503/https://watermark.silverchair.com/nwab069.pdf?token=AQECAHi208BE49Ooan9kkhW_Ercy7Dm3ZL_9Cf3qfKAc485ysgAAAtIwggLOBgkqhkiG9w0BBwagggK_MIICuwIBADCCArQGCSqGSIb3DQEHATAeBglghkgBZQMEAS4wEQQMfjl_Nakmsc8GJeH_AgEQgIIChXmebzqjTjjr_jvHYVnqnRL58r3vfYQ3AdvMzYvt3IxDQAzaPMzXaCrSr4mJ9jkePvv0liiJ0SU5Z_hlZk7QGRoRQFvvceIS7XU-txPuHETrttFFMWQASOwBETHFqZD7QWHYXdHczTFRMx7TnIz6KqdM2NY6YXwYQjLdSbEpnBLr1CdNXHM2WmY9MrM5y6lS5iOi4IlrzM9aWO168s1K9-sE34ZNVREEh8vJFnZQw7MaM0d-iWbHF7dn7aUUZlW1gA3Xf4PfXdM96xzqZnG99Ctu-k_2-GLxdaAaEkRajEE-BsR98mdr3qIIj6wB0oRqa-D7wyPAoNETD9Gx29ipabNUsksGVkys3PzQNCi1EeKu5QN1c0SOLvlp-0uAThSAk-W2JYYRitZF9FguYtZ5-n7FFWn5iYA6tmZHk8ZBth_YBQNUESYxJpp053O9hA6UWGMInK-NQlJtTUPYzWjA3FyXlQajnfyPl9RxuHVxDFFGs2lYL9Mq1rUkYqsiha_eShjbnqUWDtpNZvnDhh5rXIUum-9nSttnclWkAMMt29qJQsSAcyr3txCHT23sO93LBE6wzZ_ymXG8aZxn7i6iDw0uq8dQgxMz8-wo3FVtOJ4UMk05-jlKbHFawmpOSRIUkOce8iF0vsMDZv88nl5EqlfBAVB2BBReFovb5LmQ9XCtQqGtM7xaAhxrNvXbi5VpiJq_pJY_PPyY61LRQiOfi0DOfkCvkPUSlB20T3bin7isZFu8WRs5yaK-cdMN8ztL36w9bE-fONZikcgfJRMhy-6cbgQC-1vS_MqXMb86CBlUa_HpFgV6TbhDME_9lPE1k7KEAedw768-lqrgxwbmVveJqHzAKw" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/db/fedb4c9cd8faf81c86347ef6ba1e4f45d43fa475.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/nsr/nwab069"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> oup.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8433085" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Machine Learning for Security in Vehicular Networks: A Comprehensive Survey [article]

Anum Talpur, Mohan Gurusamy
<span title="2021-08-19">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Apart from the traditional vehicular networks, we also consider modern vehicular network architectures.  ...  In this regard, ML and its variants are gaining popularity to detect attacks and deal with different kinds of security issues in vehicular communication.  ...  Another variant, deep neural network (DNN) is an ANN with deep (multiple) hidden layers [126] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.15035v2">arXiv:2105.15035v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5z6aqlvosjgf3o3amts3k6toxu">fatcat:5z6aqlvosjgf3o3amts3k6toxu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210825022630/https://arxiv.org/pdf/2105.15035v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3d/e6/3de6cc8f96905a1eacdf4ec8f4cb055ddce06a7d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.15035v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

Isaac Wiafe, Felix N. Koranteng, Emmanuel N. Obeng, Nana Assyne, Abigail Wiafe, Stephen R. Gulliver
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Most studies have focused on intrusion detection and prevention systems, and the most dominant technique used was support vector machines.  ...  In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes.  ...  Camp, ''Detection of Rogue Certificates from Trusted Certificate Authorities FELIX NTI KORANTENG received the Bachelor of Science degree in computer science from the Kwame Nkrumah University of Science  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3013145">doi:10.1109/access.2020.3013145</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a3ton5hsnjhgph7zvevge5ffmi">fatcat:a3ton5hsnjhgph7zvevge5ffmi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717173405/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09152956.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9e/ef/9eef4154ae86a5ff5fbec03fff40ef705becf3c0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3013145"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Safeguarding unmanned aerial systems: an approach for identifying malicious aerial nodes

Mohd Abuzar Sayeed, Rajesh Kumar, Vishal Sharma
<span title="2020-07-30">2020</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hilohscapjgk3kxfrc3gt64bvm" style="color: black;">IET Communications</a> </i> &nbsp;
Neural networks-based predictions are used for detecting abnormality in behavioural, statistical, and mobility patterns.  ...  Principal component analysis based on multivariate statistical analysis is used for detecting outliers in the aerial network environment.  ...  LSTM is a deep learning algorithm that makes use of artificial recurrent neural networks architecture. LSTM networks are best suited to make predictions based on time series data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-com.2020.0073">doi:10.1049/iet-com.2020.0073</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/guulooew3baf7ptqv6xwimd7ta">fatcat:guulooew3baf7ptqv6xwimd7ta</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716041327/https://ietresearch.onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-com.2020.0073" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/a5/80a5ec7398e27cf04b3693cbdea6cb104df7d325.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-com.2020.0073"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning

George Loukas, Tuan Vuong, Ryan Heartfield, Georgia Sakellari, Yongpil Yoon, Diane Gan
<span title="">2018</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
We use both a deep multilayer perceptron and a recurrent neural network architecture, with the latter benefitting from a long-short term memory hidden layer, which proves very useful for learning the temporal  ...  Using as case study a small four-wheel robotic land vehicle, we demonstrate the practicality and benefits of offloading the continuous task of intrusion detection that is based on deep learning.  ...  malware [38] or rogue certificates from trusted certificate authorities [39] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2017.2782159">doi:10.1109/access.2017.2782159</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/njik42b4qfflta7tupl3y37xnq">fatcat:njik42b4qfflta7tupl3y37xnq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720210642/http://gala.gre.ac.uk/18213/7/18213%20LOUKAS_Cloud-Based_Cyber-Physical_Intrusion_Detection_2017.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/ac/33ac5b06cea831e8eb8329200b6a56394fdced3f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2017.2782159"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

AMP: Authentication of Media via Provenance [article]

Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor (+7 others)
<span title="2020-06-20">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
One approach to thwarting the flow of fake media is to detect modified or synthesized media through machine learning methods.  ...  AMP, through its use of CCF, enables a consortium of media providers to govern the service while making all its operations auditable.  ...  Their approach to detecting deep fakes is to train a convolutional neural network (CNN) to detect this mismatch in the color.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2001.07886v3">arXiv:2001.07886v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ypadanuz6vhlbdkbavf3zb3yo4">fatcat:ypadanuz6vhlbdkbavf3zb3yo4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200624002306/https://arxiv.org/pdf/2001.07886v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2001.07886v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A survey on Blockchain-based applications for reforming data protection, privacy and security [article]

Phan The Duy, Do Thi Thu Hien, Van-Hau Pham
<span title="2020-09-01">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this case, blockchain has the capability and potential to revolutionize trust, security and privacy of individual data in the online world.  ...  It has been spreading with multi-sector applications from financial services to healthcare, supply chain, and cybersecurity emerging every passing day.  ...  The authors built a firewall based on blockchain, while deep belief neural network (DBN) is used in detection engine to classify Portable Execution (PE) files as malicious or benign through analyzing representation  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.00530v1">arXiv:2009.00530v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3mptx7scmba27fa3s2t2fjnk3y">fatcat:3mptx7scmba27fa3s2t2fjnk3y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200903022136/https://arxiv.org/ftp/arxiv/papers/2009/2009.00530.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.00530v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets [article]

Hanan Hindy and David Brosset and Ethan Bayne and Amar Seeam and Christos Tachtatzis and Robert Atkinson and Xavier Bellekens
<span title="2018-06-09">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets.  ...  These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets  ...  A Deep Learning Approach for Intrusion Detection Using Recur- rent Neural Networks NSL-KDD -DL RNN -Probing -DoS -R2L -U2R [103] 2017 David Ahmad Ef- fendy et al.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.03517v1">arXiv:1806.03517v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d6vf2i7gkzbjvm6zb7s6hqcn2e">fatcat:d6vf2i7gkzbjvm6zb7s6hqcn2e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200906185615/https://arxiv.org/pdf/1806.03517v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/42/0a42cafb985f79ac4786e37bfa261d0b5acab6bd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.03517v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Security Threats Taxonomy for Routing System Intrusion Detection

Fu Miao, Zhenxing Wang, Yi Guo, Liancheng Zhang
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kwxuvvcdufh35lyl2jv3dlj2lm" style="color: black;">2016 12th International Conference on Computational Intelligence and Security (CIS)</a> </i> &nbsp;
This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets.  ...  These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets  ...  A Deep Learning Approach for Intrusion Detection Using Recur- rent Neural Networks NSL-KDD -DL RNN -Probing -DoS -R2L -U2R [103] 2017 David Ahmad Ef- fendy et al.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cis.2016.0068">doi:10.1109/cis.2016.0068</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cis/MiaoWGZ16.html">dblp:conf/cis/MiaoWGZ16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qp7rz34u3fbhhlvfxl5nakdewe">fatcat:qp7rz34u3fbhhlvfxl5nakdewe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321183511/https://works.bepress.com/xavier-bellekens/16/download/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7a/ac/7aac92605e36b155a2bf420beb6a30b88c2082ab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cis.2016.0068"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Comprehensive Review of Cybercrime Detection Techniques

Wadha Abdullah Al-Khater, Somaya Al-Ma'adeed, Abdulghani Ali Ahmed, Ali Safaa Sadiq, Muhammad Khurram Khan
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Finally, it provides recommendations for the development of a cybercrime detection model that can detect cybercrimes effectively compared with the existing techniques.  ...  It also reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyzes the vulnerabilities of each technique.  ...  Zhang and Yuan [67] utilized a neural network to detect phishing attacks. The authors have used multilayer feedforward neural network, achieving accuracy of 95% for detecting phishing attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3011259">doi:10.1109/access.2020.3011259</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m2nbqwxqvvabfea5fbtzvjuoey">fatcat:m2nbqwxqvvabfea5fbtzvjuoey</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717234528/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09146148.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/02/e9/02e982bc3b296e456b9a4cc9990d2d13b82535c8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3011259"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Uzair Javaid, Furqan Jameel, Umair Javaid, Muhammad Toaha Raza Khan, Riku Jäntti, Zengpeng Li
<span title="2020-10-28">2020</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/khqygtfojnby3jyh5obuwd7ko4" style="color: black;">Mobile Information Systems</a> </i> &nbsp;
This allows the proposed scheme to authorize registered devices only and block unregistered ones, which facilitates the mitigation of rogue devices.  ...  Among these, the emergence of rogue devices is quickly becoming a major security concern.  ...  Conflicts of Interest e authors declare that they have no conflicts of interest regarding the publication of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/8831976">doi:10.1155/2020/8831976</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cdwkx4alffhyvotgyfz6hh6euq">fatcat:cdwkx4alffhyvotgyfz6hh6euq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210427232559/https://acris.aalto.fi/ws/portalfiles/portal/53624304/ELEC_Javaid_Rogue_device_MCS.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/c3/a5c3a382028c089fa3cc2cdd9e18434fc3e99a97.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/8831976"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 163 results